Final Exam

Ace your homework & exams now with Quizwiz!

c. Yes, authenticated users can create workstation, but not server objects

Can a domain user, who does not possess explicit object creation permissions, create computer objects? a. No, not without the object creation permission b. Yes, an authenticated user can create a server object, after authenticating to a different domain server c. Yes, authenticated users can create workstation, but not server objects d. Can create workstation and server objects

c. Yes, if the workstation is running the Remote Server Administration Tools package

Can an administrator launch the Group Policy Management console from a workstation? a. No, the Group Policy Management console cannot be launched from a workstation b. Yes, if the administrator previously installed the Group Policy Management feature c. Yes, if the workstation is running the Remote Server Administration Tools package d. Yes, with no other requirements

d. 21cd:53::/64

Certain IPv6 addresses can be contracted. Which of the following answers is the contracted form of 21cd:0053:0000:0000/64? a. 21cd:53::/32 b. 21cd::53::/64 c. 0:21cd:53::/64 d. 21cd:53::/64

a. 1, 2

In Hyper-V and Windows Server 2012 R2, which of the following operating systems support enhanced session mode? (Choose all that apply.) 1. Windows Server 2012 R2 2. Windows 8.1 64-bit 3. Windows 7 64-bit with SP1 4. Windows 8 32-bit 5. Windows Server 2012 a. 1, 2 b. 1, 2, 3 c. 1, 3, 4 d. 2, 3 e. 2, 4, 5

a. access token

In Windows Server 2012 R2, after a user logs on to Active Directory, a(an) ________ is created that identifies the user and all the user's group memberships. a. access token b. access control entry c. authentication token d. universal group

a. loads first, then loads

In Windows Server 2012 R2, the hypervisor ________ the host operating system. a. loads first, then loads b. loads after the c. runs on top of d. within

b. Generation 2 VM

In Windows Server 2012 R2, which type of VM allows for UEFI boot and SCSI disks to boot the system? a. Generation 1 VM b. Generation 2 VM c. Generation 3 VM d. Native VM

a. Printer

In Windows, a ______ is the software interface through which a computer communicates with a print device. a. Printer b. Printing device c. Print device d. Print driver

b. user accounts

Resource access for individuals is determined through their ______. a. computer accounts b. user accounts c. authentication d. shared folders

c. Application Services

File and Storage Services falls into which of the following basic role categories: a. Directory Services b. Infrastructure Services c. Application Services d. Network Services

b. Computer Configuration\Policies\Windows Settings\Windows Firewall with Advanced Security

What GPO node presents the interface with which to configure Windows Firewall properties? a. Computer Configuration\Policies\Windows Settings\Security Settings\Windows Firewall with Advanced Security b. Computer Configuration\Policies\Windows Settings\Windows Firewall with Advanced Security c. User Configuration\Policies\Windows Settings\Windows Firewall with Advanced Security d. User Configuration\Policies\Windows Settings\Security Settings\Windows Firewall with Advanced Security

d. RAID 5

What RAID level is a stripe set with distributed parity? This RAID level is implemented in Windows Server 2012 R2? a. RAID 0 b. RAID 1 c. RAID 3 d. RAID 5

b. Print Management snap-in for MMC

What administrative tool consolidates the controls for the printing components throughout the enterprise into a single console? a. Server Manager b. Print Management snap-in for MMC c. Control Panel d. Remote Desktop Easy Print

a. Bidirectional trust relationship between domains

What allows administrators to grant users in one domain access to resources of another domain within the same domain tree? a. Bidirectional trust relationship between domains b. Permission inheritance between domains c. Permission inheritance between OUs d. User objects in each domain

c. Group Policy Management console

What application or interface allows you to configure security filtering? a. Active Directory Administrative Center b. Server Manager c. Group Policy Management console d. Active Directory Users and Computers

d. Active Directory schema

What defines what objects exist as well as what attributes are associated with any object in the Active Directory? a. Active Directory administrator b. Active Directory global directory c. Active Directory root user d. Active Directory schema

d. The lowest version of Windows Server on a domain controller

What determines the functional level of an Active Directory forest? a. How many domains are in the forest b. How many domain controllers are in each domain c. The functional level as specified in the Active Directory Users and Computers console d. The lowest version of Windows Server on a domain controller

d. The lowest version of Windows Server on a domain controller

What determines the maximun allowed functional level of an Active Directory forest? a. How many domains are in the forest b. How many domain controllers are in each domain c. The functional level as specified in the Active Directory Users and Computers console d. The lowest version of Windows Server on a domain controller

c. User Account Control (UAC)

What did Microsoft introduce in Windows Server 2008, which is used to ensure users with administrative privileges still operate routine tasks as standard users? a. New Group Policy and Local Security Policy b. Secure desktop c. User Account Control (UAC) d. Built-in administrator account

b. Virtual disks only

What disk types can be extended? a. All disks manageable by Server Manager b. Virtual disks only c. Physical disks only d. Physical disks and virtual disks both

d. authentication

What do you call the process of confirming a user's identity by using a known value such as a password, a smart card, or a fingerprint? a. authorization b. permission c. delegation d. authentication

b. authorization

What do you call the process of confirming that a user has the correct permissions to access one or more network resources? a. permission b. authorization c. delegation d. authentication

a. inheritance

What do you call the process that after you link a GPO to a site with multiple domains, the Group Policy settings are applied to all the domains and the child objects beneath them? a. inheritance b. linking c. downward application d. relevance

b. Authoritative source

What do you call the source responsible for maintaining a domain's resource records? a. Authenticate source b. Authoritative source c. Root server d. Down-level server

a. Network intrusion attempts, such as a denial of service attack

What does a firewall protect your company against? a. Network intrusion attempts, such as a denial of service attack b. Physical intrusion attempts, such as a broken front door c. Personnel intrusion attempts, such as social engineering d. Natural acts, such as an electrical surge caused by a lightning strike

b. The ability to display inbound or outbound rules in the console according to a profile

What does the term "filter" refer to in the Windows Firewall With Advanced Security console? a. The ability to screen traffic segments or packets b. The ability to display inbound or outbound rules in the console according to a profile c. The ability to filter Group Policy settings per firewall d. The ability to filter Group Policy settings per traffic type

d. Teredo

What encapsulates IPv6 packets within User Datagram Protocol (UDP) datagrams between two registered IPv4 nodes in order to traverse IPv4 networks? a. ISATAP b. 6to4 c. IPv4 d. Teredo

d. heating and cooling system of the datacenter

What factor is not important for choosing the best Windows Server 2012 R2 edition for your environment? a. virtualization strategy you intend to implement b. licensing strategy you plan to use c. roles you intend the servers to perform. d. heating and cooling system of the datacenter

c. Active Directory Administrative Center

What graphical tool can create user and computer accounts and was redesigned for Windows Server 2012? a. New-ADUser b. CSVDE.exe c. Active Directory Administrative Center d. Dsadd.exe

b. Roles installed

What impacts the types of logs and events logged on a server? a. Hardware installed b. Roles installed c. Users logged in d. Physical orientation

a. Resource metering documents virtual machine usage regarding a variety of criteria

What is Resource Metering? a. Resource metering documents virtual machine usage regarding a variety of criteria b. Resource metering documents resource usage of host systems that run virtual machines c. Resource metering documents user traffic on virtual machines d. Resource metering enables you to redistribute virtual machine resources

a. print job files stay a single document format to the print device, rather than conversion through EMS and PCL

What is XML Paper Specification (XPS)? a. print job files stay a single document format to the print device, rather than conversion through EMS and PCL b. interim print job file format from EMS to XPS to PCL c. alternative print job file format, rather than PCL d. print job format for documents sent over the network, rather than locally attached printing

a. Security template

What is a collection of configuration settings stored as a text file with an .inf extension? a. Security template b. Policy configuration c. Deployment list d. Right assignment

a. Organizational unit

What is a container object that functions in a subordinate capacity to a domain, and still inherits policies and permissions from its parent objects? a. Organizational unit b. Group c. Domain d. Forest

c. Inheritance

What is a key difference between a domain /sub-domain tree hierarchy and a nested organizational unit (OU) hierarchy within a domain? a. Ability to apply Group Policy b. Members allowed within c. Inheritance d. Membership

c. CIDR

What is a subnetting method that enables you to place the division between the network bits and the host bits anywhere in the address, not just between octets? a. ISATAP b. NAT c. CIDR d. Teredo

a. ISATAP

What is a tunneling protocol that emulates an IPv6 link using an IPv4 network, primarily for Windows workstation operating systems? a. ISATAP b. NAT c. DirectAccess remote networking d. Teredo

c. A Windows workstation assigns itself an address on the 169.254.0.0./16 network

What is an example of Automatic Private IP Addressing (APIPA) in IPv4? a. An address from the 192.168.0.0/16 or the 172.16.0.0/12 networks b. The process of discovering, offering, requesting, and acknowledging an IP address from a DHCP server. c. A Windows workstation assigns itself an address on the 169.254.0.0./16 network d. An address from the fc00::/7 address block

c. 192.29.1.42

What is an example of a valid IPv4 address? a. 21cd:0053:0000:0000:e8bb:04f2:003c:c394 b. 192.263.42.1 c. 192.29.1.42 d. 21cd:53::e8bb:4f2:3c:c394

d. Group memberships are independent of the domain's tree structure.

What is an important difference between groups and OUs (organizational units)? a. An OU can represent the various divisions of your organization but a group cannot. b. Group membership can be a subset of an OU. c. OUs are a security entity but groups are not. d. Group memberships are independent of the domain's tree structure.

c. When delegating administrative tasks, grant users only the necessary privileges.

What is best practice for delegating server administration? a. Delegate tasks to users most familiar with the applications. b. Delegate tasks that require the least privileges. c. When delegating administrative tasks, grant users only the necessary privileges. d. When delegating administrative tasks, grant users enough privileges for those tasks and expected tasks.

a. Group Policy Management console

What is the Microsoft Management Console (MMC) snap-in that you use to create GPOs and manage their deployment to AD DS objects? a. Group Policy Management console b. Active Directory Administrative Center c. Server Manager d. Disk Management

a. Install-AddsForest -DomainName "adatum.com"

What is the PowerShell cmdlet for installing a domain controller to the domain "adatum.com"? a. Install-AddsForest -DomainName "adatum.com" b. Install-AddsDomainController -DomainName "adatum.com" c. Install-AddsDomain -DomainName "adatum.com" d. Install-WindowsFeature -DomainName "adatum.com"

a. New-ADUser

What is the PowerShell cmdlet used to create user objects? a. New-ADUser b. CSVDE.exe c. LFIFDE.exe d. Dsadd.exe

b. SAM account name is ella, and the User Principal Name is [email protected]

What is the SAM account name and the User Principal Name for the account [email protected]? a. SAM account name is [email protected], and the User Principal Name is ella b. SAM account name is ella, and the User Principal Name is [email protected] c. Both the SAM account name and the User Principal Name are: [email protected] d. Both the SAM account name and the User Principal Name are: ella

d. Volume Shadow Copies

What is the Windows Server 2012 R2 feature that enables you to maintain previous versions of files on a server, so that if users accidentally delete or overwrite a file, they can access a copy? a. Backup b. Adjusting NTFS permissions so users may not delete c. Mirroring to DVD d. Volume Shadow Copies

b. 63; 255

What is the character limit on individual domain names, and the limit on the Fully Qualified Domain Names (FQDNs)? a. 15; 64 b. 63; 255 c. 31; 128 d. 63; 128

a. netdom renamecomputer %ComputerName% /NewName: <NewComputerName>

What is the command-line tool for renaming a computer and what is the command? Choose the proper syntax. a. netdom renamecomputer %ComputerName% /NewName: <NewComputerName> b. netdom rename_computer %ComputerName% /Name: <NewComputerName> c. netdom renamecomputer %ComputerName% /Name: <NewComputerName> d. netdom rename %ComputerName% /New: <NewComputerName>

a. 1 hour

What is the default TTL for a Windows Server 2012 R2 DNS server? a. 1 hour b. 12 hours c. 5 minutes d. 36 hours

d. 8 days

What is the default lease period for DHCP dynamic address allocation? a. 96 hours b. 3.5 days c. 4.5 days d. 8 days

a. 16,384 KB

What is the default size for each of the three Event logs? a. 16,384 KB b. 8,192 KB c. 32,768 KB d. 65,536 KB

d. security filtering

What is the technique called that you can modify the default permission assignments so that only certain users and computers receive the permissions and, consequently, the settings in the GPO? a. inheritance b. special identity linking c. permission granting d. security filtering

b. 6to4

What is the technology intended to help transition IPv4 networks to IPv6, by expressing IPv4 addresses in IPv6 format? a. Stateless Address Autoconfiguration b. 6to4 c. tunneling d. CIDR

c. SCSI

What physical disk technology offers the fastest transmission speeds? a. SATA b. ATA c. SCSI d. direct attached storage typically used in desktop workstations

b. Restricted Groups policy

What policy setting enables you to specify group membership lists, allowing you to control membership in important groups, such as the local Administrators and Backup Operators groups? a. Grouping Members policy b. Restricted Groups policy c. Special Identities policy d. Members Only policy

b. No other role

What roles does Microsoft recommend can share the same server as the Hyper-V role? a. Any other role b. No other role c. File and print roles d. Web server

a. Work Folders

What service allows users to store files on a network file server, which can be accessed from multiple workstations or devices? a. Work Folders b. Sync Share Folder c. Control Folder d. Collaboration folder

c. Configures the IP address and other TCP/IP settings on network computers

What service does Dynamic Host Configuration Protocol (DHCP) provide? a. Resolves web addresses to IP addresses b. Resolves NetBIOS names to host names c. Configures the IP address and other TCP/IP settings on network computers d. Blocks unsolicited inbound traffic from entering the network perimeter

c. SRV

What special DNS resource record enables clients to locate domain controllers and other vital AD DS services? a. AAAA b. MX c. SRV d. NS

b. Windows Firewall With Advanced Security snap-in for the Microsoft Management console

What tool offers more flexibility in creating rules compared with the Windows Firewall interface that is found in the Control Panel? a. Active Directory Users and Computers b. Windows Firewall With Advanced Security snap-in for the Microsoft Management console c. Windows Firewall With Advanced Settings in the Server Manager Tools menu d. Run > Windows Firewall

d. Infrastructure as a Service (IaaS)

Which of the following features allows you to create virtual machines on a leased cloud resource? a. Windows Intune b. Hyper-V on a Cloud c. Office 365 d. Infrastructure as a Service (IaaS)

b. Windows Azure

Which of the following features allows you to install AD DS on a virtual machine that is located in the cloud? a. Windows Intune b. Windows Azure c. Office 365 d. PCI DSS

c. RemoteFX

Which of the following features includes USB direction, which enables USB devices connected to client computers to be redirected to the host server, including printers, storage devices, and audio devices? a. Enhanced Session mode b. USB pointers c. RemoteFX d. Virtual USB mode

a. Renaming the Administrator account name so as not to distinguish it from non-administrative accounts

Which of the following guidelines are NOT best practice for securing the Administrator account? a. Renaming the Administrator account name so as not to distinguish it from non-administrative accounts b. At least seven characters length and strong complexity for the account password c. Using the Administrator account for daily, non-administrative tasks d. Share the administrator account with only a few, necessary individuals

b. Take ownership

Which of the following is NOT a basic printer permission? a. Print b. Take ownership c. Manage this printer d. Manage documents

d. Security

Which of the following is NOT a group scope? a. Universal b. Global c. Domain local d. Security

a. Dialup Service

Which of the following is NOT an example of a special identity? a. Dialup Service b. Creator Owner c. Authenticated Users d. Anonymous Logon

a. Organizational unit

Which of the following is an example of an Active Directory container object within a domain? a. Organizational unit b. Group c. Subdomain d. Forest

b. 1, 2, 4, 5

Which of the following operating systems can be used with Generation 2 VMs? (Choose all that apply.) 1. Windows Server 2012 R2 2. Windows 8.1 64-bit 3. Windows 7 64-bit with SP1 4. Windows 8 32-bit 5. Windows Server 2012 a. 1, 2, 3 b. 1, 2, 4, 5 c. 1, 3, 4, 5 d. 2, 3, 4 e. 2, 4, 5

b. 21cd:0053:0000:0000:e8bb:04f2:003c:c394

14. What is an example of a valid IPv6 address a. 192.168.42.1 b. 21cd:0053:0000:0000:e8bb:04f2:003c:c394 c. 192.256.1.42 d. 21cd:53::::e8bb:4f2:3c:c394

c. Time To Live (TTL) specified by each DNS server's administrator

A DNS server receives updated information. Other DNS servers have outdated information cached. What determines the amount of time that the old DNS data remains cached on a server and an update might occur? a. The distance (number of network hops) between the new information and queried DNS server b. Network congestion between DNS servers c. Time To Live (TTL) specified by each DNS server's administrator d. The version of Windows Server on the DNS server

b. False

Administrator decides to install the operating system via the Server Core in Windows Server 2012 R2. There is no way to get the GUI back at a later date except to perform a compete reinstallation a. True b. False

d. Using Server Manager's Add Roles & Features Wizard, you end by selecting Export configuration settings.

Across multiple sites are several servers on which you must install the same roles and features. The servers are not all on the network, so you need a configuration file you can distribute to administrators at the various sites. What do you do? a. After selecting Add Roles & Features, you can browse for the offline VHD. b. Using Switch Independent Mode, employ NIC teaming, and then active/standby mode. c. Replace the GUI with Server Core d. Using Server Manager's Add Roles & Features Wizard, you end by selecting Export configuration settings.

c. DNS

Active Directory uses a naming convention for domains that is based on: a. DHCP b. WINS c. DNS d. files and folders

c. Datacenter, Standard and Foundation

Active directory lightweight directory services is available on what Windows Server editions? a. All editions b. Datacenter and Standard c. Datacenter, Standard and Foundation d. datacenter edition only

b. Clicking the Effective Access tab on the Advanced Security Settings dialog box

After applying permissions to a group that already inherits permissions, you are concerned about the effective access. Rather than examine and evaluate all possible permission sources, where can you check the effective access more easily? a. Clicking the Effective Access tab on the NTFS Advanced Security Settings dialog box b. Clicking the Effective Access tab on the Advanced Security Settings dialog box c. Reviewing the Allow permissions and Deny permissions d. Reviewing the Allow permissions, Deny permissions, and Explicit permissions

d. Server Manager

After initially configuring a new server with defualt settings, you can fully manage it without needing to be present at its console. What tool allows this? a. Active Directory Domain Services (AD DS) b. Remote Desktop c. Active Directory Users and Computers d. Server Manager

a. The newly installed hypervisor starts first, then loads the operating system as the primary or parent partition

After installing the Hyper-V role, what is the startup procedure for Windows Server 2012 R2? a. The newly installed hypervisor starts first, then loads the operating system as the primary or parent partition b. The actual startup procedure is not altered c. The newly installed hypervisor starts alongside of the operating system simultaneously d. The newly installed hypervisor starts second, after the operating system loads as a partition

a. uninitialized disk

After you create a new VHD, it appears as a _________ in the Disk Management snap-in and in Server Manager. a. uninitialized disk b. formatted disk c. initialized disk d. storage pool

a. Storage pool

After you install your physical disks, you can concatenate their space together, from which you can create virtual disks of any size. This total space is called a ________. a. Storage pool b. Storage spaces c. Storage volume d. Virtual pool

d. Convert the distribution group to a security group and then assign the group access permissions.

An administrator needs to grant an e-mail distribution group of 100 members access to a database, how would the administrator proceed? The e-mail group is obsolete and can be dissolved. a. Assign the necessary access permissions to the database to the distribution group. b. Create a new group with the 100 members, then assign permissions. c. Remove the distribution group, and then convert the members into a universal group, granting access permissions. d. Convert the distribution group to a security group and then assign the group access permissions.

a. TRUE

As Windows Server 2012 and Windows Server 2012 R2 focuses more on virtualization, administrators must consider the roles a server performs both at deployment as well as in the future. a. TRUE b. FALSE

a. Class A, B, C, differing by how many bits distinguish the networks from the hosts

As defined by the original Internet Protocol standard, what are the three classes of IP addresses used for networks, and what differentiates them? a. Class A, B, C, differing by how many bits distinguish the networks from the hosts b. Class 1, 2, 3, differing by how many bits distinguish the networks from the hosts c. Class A, B, C, differing by the number in the first byte d. Class 1, 2, 3, differing by the number in the first byte

a. Smart Paging will only trigger if a VM has shrunken below its Startup RAM toward its Minimum RAM setting.

Assuming your virtual machines has dynamic memory enabled, when does Smart Paging actually trigger? a. Smart Paging will only trigger if a VM has shrunken below its Startup RAM toward its Minimum RAM setting. b. Smart Paging will only trigger if a VM has shrunken below its Startup RAM toward its Maximum RAM setting. c. Smart Paging will trigger only when a VM is not able to use dynamic memory and its Minimum RAM is depleted. d. Smart Paging triggers if a VM has shrunken below its minimum RAM toward its Maximum RAM.

a. Install-WindowsFeature -ConfigurationFilePath <ExportedConfig.xml>

At the end of installing a role using Server Manager, you can export the configuration settings to a script file. Then, using PowerShell, you use the script to install roles and features on another Windows Server 2012 R2. What is the PowerShell cmdlet for executing this script? a. Install-WindowsFeature -ConfigurationFilePath <ExportedConfig.xml> b. Install-RoleFeature -ConfigurationFilePath <ExportedConfig.xml> c. Install-Feature -ConfigurationFilePath <ExportedConfig.xml> d. Install-NewFeature -ConfigurationFilePath <ExportedConfig.xml>

a. 1, 2

Before a DHCP server can hand out addresses, which of the following steps must be completed? (Choose two answers.) 1. A DHCP scope must be created and activated. 2. The DHCP server must be created and authorized. 3. The DHCP server must be put in the trusted list on the client computers. 4. The DHCP server must be installed by an Enterprise Administrator. a. 1, 2 b. 1, 4 c. 2, 3 d. 3, 4

c. Backup the entire system.

Before you perform any upgrade procedure, you should ______ . a. Delete unnecessary applications. b. Install the applications you expect to need. c. Backup the entire system. d. Install additional memory.

a. all its rules, including the preconfigured rules and the ones you have created or modified

By exporting the Windows Firewall policy, you have a file with a .wfw extension that contains _____. a. all its rules, including the preconfigured rules and the ones you have created or modified b. all the rules you have created or modified c. preconfigured rules to be applied to another firewall d. firewall settings as specified by the Group Policy settings

d. Wireless Network Policies (IEEE 802.3)

Computer Configuration node security settings include several security areas. Which of the following is NOT one of them? a. Account Policies b. Local Policies c. Restricted Groups Policy d. Wireless Network Policies (IEEE 802.3)

a. .com, .net, .org

Concerning DNS domain hierarchy, what are examples of global top-level domains? a. .com, .net, .org b. .mil, .gov, .edu c. .aero, .name, .pro d. .ca, .cz, .kr

c. When a DNS server caches information about a non-existent host

Concerning DNS, what is negative caching? a. When a DNS server caches incorrect information about a host b. When a DNS server caches obsolete information about a host c. When a DNS server caches information about a non-existent host d. When a DNS server forwards incorrect information about a host

d. "SYSVOL bloat"

Configuring a Central Store of ADMX files help solve the problem of ________ a. excessive REQ_QWORD registry entries on every workstation b. replication time for copying policies c. Windows 7 workstations not able to receive policies d. "SYSVOL bloat"

d. Dynamic, automatic, and manual

DHCP standards define multiple methods to allocate IP addresses. What are they? a. Dynamic and automatic b. Automatic and manual c. Dynamic only d. Dynamic, automatic, and manual

b. The server responds with a DHCPNAK message to the client.

During DHCP lease negotiation, what happens if the client requests an IP address from the server but the server has already assigned the offered IP address? a. The server responds with a DHCPACK message to the client. b. The server responds with a DHCPNAK message to the client. c. The server responds with a DHCPSOS message to the client. d. The server ignores the client until the lease negotiation expires and process restarts.

c. Inbound—block all. Outbound—permit all

Firewall rules function in two ways: admit all traffic, except that which conforms to the applied rules, and secondly, block all traffic, except that which conforms to the applied rules. How does the Windows Firewall work for inbound traffic and for outbound traffic? a. Inbound—permit all. Outbound—block all b. Inbound—block all. Outbound—block all c. Inbound—block all. Outbound—permit all d. Inbound—permit all. Outbound—permit all

d. 100 percent because dynamic address allocation requires periodic lease renewal messages whereas automatic does not

For DHCP address allocation, by how much is network traffic reduced related to periodic lease renewal messages when switching from dynamic allocation to automatic allocation? a. Dynamic address allocation does not require periodic lease renewal messages. b. None, because both address allocation methods require periodic lease renewal messages c. 50 percent because automatic allocation cuts the periodic messages in half d. 100 percent because dynamic address allocation requires periodic lease renewal messages whereas automatic does not

b. Windows Server 2012 R2 now allows administrators to use PowerShell.

For Server Core installations, how does Windows Server 2012 R2 differ from Windows Server 2008 when installing the AD DS role and promoting the system to a domain controller? a. Windows Server 2012 R2 now allows administrators to use Dcpromo.exe. b. Windows Server 2012 R2 now allows administrators to use PowerShell. c. Windows Server 2012 R2 permits administrators to use answer files for unattended DC installations. d. Windows Server 2012 R2 recommends administrators use Install from Media.

c. An internal network that is not accessible by unauthorized users

For the Windows Firewall private profile, what type of network is expected? a. An unsecure network where unauthenticated users are probable b. An unsecure network where users must authenticate to the server c. An internal network that is not accessible by unauthorized users d. No network—private means no network connection allowed

b. network bits

Given the IPv6 address: 21cd:001b:0000:0000/8, what does the "/8" at the end signify? a. number of address bytes b. network bits c. number of hosts per this network d. number of possible networks

b. Software settings, Windows settings, and Administrative Templates

Group Policy settings are divided into two subcategories: User Configuration and Computer Configuration. Each of those two are further organized into three subnodes. What are the three? a. Software settings, Windows settings, and Delegation Templates b. Software settings, Windows settings, and Administrative Templates c. Security settings, Windows settings, and Delegation Templates d. Security settings, Windows settings, and Administrative Templates

a. guest integration services

Heartbeat, time synchronization, and data exchange between parent and child partitions are all examples of functions provided by ________ a. guest integration services b. smart paging c. resource metering d. Hyper-V Server

c. Obtain an IP address automatically

How are DHCP settings labeled in a Windows computer's network interface? a. Address retrieval b. DHCP c. Obtain an IP address automatically d. Automatic addressing

d. DHCPOFFER

How do DHCP servers respond to a DHCPDISCOVER message? a. DHCPINFORM b. DHCPRELEASE c. DHCPACK d. DHCPOFFER

d. Both utilities can import users, but only LDIFDE can modify or delete objects later

How does CSVDE.exe differ from LDIFDE.exe? a. Both utilities can import users, but only CSVDE can modify or delete objects later b. CSVDE can modify existing AD DS objects c. Only LDIFDE can import users d. Both utilities can import users, but only LDIFDE can modify or delete objects later

b. subnetting method that divides between network bits and host bits anywhere, not only between octets

How does Classless Inter-Domain Routing help reduce waste of IP addresses? a. subnetting method also called variable length subnet masking b. subnetting method that divides between network bits and host bits anywhere, not only between octets c. uses network address translation d. converts between IPv4 and IPv6

c. In Windows Server 2012 R2, creating the scope is done separately, after adding the DHCP Server role.

How does DHCP scope creation differ in Windows Server 2012 and Windows Server 2012 R2 compared to prior Windows Server versions? a. In Windows Server 2012 R2, creating the scope is done separately, before being allowed to add the DHCP Server role. b. In Windows Server 2012 R2, you create the scope as you install the DHCP Server role. c. In Windows Server 2012 R2, creating the scope is done separately, after adding the DHCP Server role. d. There are no fundamental differences in scope creation.

d. The client sends a DHCPREQUEST message to all servers with the IP address of the chosen DHCP server.

How does a DHCP client communicate which offered IP address it will accept from which DHCP server? a. The client sends a DHCPREQUEST message to the server. b. The client selects the closest server and beeps audibly to accept the offer. c. The client sends a DHCPACK message to all servers with the IP address of the chosen DHCP server. d. The client sends a DHCPREQUEST message to all servers with the IP address of the chosen DHCP server.

c. 50 percent, or at 4 days into the lease

How far into the lease period does a DHCP client begin requesting renewal of the IP address? a. 50 percent, or about 2 days into the lease b. 75 percent, or about 2 days into the lease c. 50 percent, or at 4 days into the lease d. 87.5 percent, or about 7 days into the lease

b. The firewall does not block client-initiated network traffic by default.

If a user attempts to use an Internet-based e-mail account, how will Windows Firewall respond? a. The firewall permits the user to visit a non-corporate website. b. The firewall does not block client-initiated network traffic by default. c. The firewall blocks the webmail account unless the user is already authenticated. d. The firewall blocks all outbound traffic.

c. Same security entity as one Active Directory forest, bidirectional trust between domain trees

If an administrator creates a domain tree in an Active Directory forest, and then creates a separate and different domain tree in the same forest, what is the relationship between the two domain trees? a. Completely different security entities, creating two Active Directory forests b. Different security entities, within one Active Directory forest c. Same security entity as one Active Directory forest, bidirectional trust between domain trees d. No trust between domain trees in an Active Directory forest

c. Public, private, and domain

If an administrator wants to enable the "Block all incoming connections, including those in the list of allowed apps" setting, to which of the firewall profiles does it apply? a. Public b. Public and private c. Public, private, and domain d. If a firewall profile is configured, this setting does not apply.

b. Examine the VHD while still offline using the Add Roles and Features Wizard.

If you want to examine the VHD to see what roles and features are already installed, how do you proceed? a. Start the VM to see what roles are already installed. b. Examine the VHD while still offline using the Add Roles and Features Wizard. c. Examine the VHD file by using the applicable PowerShell cmdlet. d. Add the VHD to a different VM, and start the second VM to examine the VHD.

d. With the Print and Document Services role added, create a custom filter in the Print Management console to search for affected printers

In an enterprise environment with hundreds of print devices, you hear early complaints of a few devices with errors. Suspecting more to come, you need to find all affected printers. How do you proceed? a. With a number of junior administrators, physically visit each printer to determine which are affected b. Wait for users to determine which print devices have errors and report to you c. deploy a GPO instructing all affected printers to sound an alarm so you may locate the affected printers d. With the Print and Document Services role added, create a custom filter in the Print Management console to search for affected printers

b. peer allocation

In general terms, there are three ways a computer receives an IPv4 or IPv6 address. Which of the following is NOT one of them? a. manual allocation b. peer allocation c. stateless address autoconfiguration d. dynamic allocation

c. guest integration services

In some cases, certain Hyper-V guest operating system features do not function properly using the OS's own device drivers. What Hyper-V software package can help remedy compatibility issues? a. resource metering b. smart paging c. guest integration services d. Hyper-V Server

a. global unicast address

In the IPv6 space, what is the equivalent of a registered IPv4 address, routable worldwide and unique on the Internet? a. global unicast address b. unique local unicast address c. anycast address d. link-local unicast address

d. rule applies to all programs, to one specific program, or to a specific service

In the Windows Firewall With Advanced Security console, while creating a new rule, the Program page specifies whether the ______. a. rule applies to all programs, or to one specific program b. rule applies to all users, or to one specific user c. rule applies to all systems, or to one specific system d. rule applies to all programs, to one specific program, or to a specific service

d. Understanding effective access

Knowing how permissions can be cumulative or override each other is an important factor in understanding what? a. Understanding permission inheritance b. Understanding explicitly assigned permissions c. Understanding permission precedence d. Understanding effective access

c. folder redirection or Group Policy software installation

Local GPOs contain fewer options than domain GPOs. Local GPOs do not support ______. a. Scripts, including logon, logoff, startup, and shutdown commands b. Windows Deployment Services (WDS) c. folder redirection or Group Policy software installation d. Registry-based policies, such as user desktop settings and environment variables

b. Security groups

Of the default groups created when Active Directory is installed, what are the types of those groups? a. Distribution groups b. Security groups c. Domain groups d. All the above

d. Assigning permissions to network resources

Of the key reasons for creating organizational units, which of the following is NOT one of them? a. Delegating administration b. Assigning Group Policy settings c. Duplicating organizational divisions d. Assigning permissions to network resources

c. Stateless IPv6 Address Autoconfiguration

Rather than manually assign IPv6 addresses to computers, how can administrators ensure each Windows computer receives a link-local unicast address upon starting? a. Booting b. CIDR c. Stateless IPv6 Address Autoconfiguration d. Site-local unicast addressing

b. ADMX files (XML-based file format)

Regarding Group Policy in Windows Server 2008 and Windows Vista, Microsoft used the token-based administrative template (ADM) files. What did Microsoft replace ADM files with, which is used in Windows Server 2012 and Windows Server 2012 R2? a. ADMX files (HTTP-based file format) b. ADMX files (XML-based file format) c. ADMX files (XLS-based file format) d. ADMX files (INF-based file format)

c. 32

Regarding both striped and spanned volumes, what is the maximum number of physical disks permitted to create a volume? a. 16 b. 12 c. 32 d. 256

d. computer roles

Regarding security templates, a strategy plan should consider ______. a. departmental roles b. workstation locations c. individual users and job functions d. computer roles

a. When a VM has to restart and not enough memory is available to allocate its startup RAM value.

Regarding virtual machines, what is Smart Paging used for? a. When a VM has to restart and not enough memory is available to allocate its startup RAM value. b. When a VM has to restart and not enough memory is available to allocate its minimum RAM value. c. When a VM is overburdened with client traffic and not enough memory is available to allocate its maximum RAM value. d. When a VM is overburdened with client traffic and just enough memory is available to allocate its maximum RAM value.

c. hypervisor

Server virtualization in Windows Server 2012 R2 is based on a module called the _________. a. virtual architecture b. hyper-v c. hypervisor d. virtual machine

a. granting

The Delegation of Control Wizard is capable of ________ permissions. a. granting b. modifying c. removing d. all the above

c. CSVDE.exe

The LDIFDE.exe utility is most similar to what other utility? a. Microsoft Excel b. Active Directory Administrative Center (ADAC) c. CSVDE.exe d. Dsadd.exe

d. Graphical User Interface

The Server Core installation option in Windows Server 2012 R2 effectively removes: a. Network adapters b. Virtualization capability c. Server management d. Graphical User Interface

d. You can start, stop, pause, or resume a service, but to change its Start Type, you require the Services MMC snap-in.

The Services tile for the Local Server in Server Manager is similar to the traditional Services MMC snap-in. How is it different? a. The Services tile in Server Manager lists services and displays their status, but cannot start or stop a service. b. You can do everything with the Server Manager Services tile that you can with the Services MMC snap-in. c. You can start a service, but to stop or pause the service or change its Start Type, you use Services MMC snap-in. d. You can start, stop, pause, or resume a service, but to change its Start Type, you require the Services MMC snap-in.

a. Windows Server 2012 R2 Datacenter

The Windows Server 2012 R2 edition available through the Microsoft volume- licensing program and from original equipment manufacturers (OEMs), but not retail is: a. Windows Server 2012 R2 Datacenter b. Windows Server 2012 R2 Standard c. Windows Server 2012 R2 Essentials d. Windows Server 2012 R2 Foundation

a. Windows Server 2012 R2 Datacenter

The Windows Server 2012 R2 edition which is designed for servers with up to 64 processors is _____: a. Windows Server 2012 R2 Datacenter b. Windows Server 2012 R2 Standard c. Windows Server 2012 R2 Essentials d. Windows Server 2012 R2 Foundation

c. Windows Server 2012 R2 Essentials

The Windows Server 2012 edition limited to one physical or virtual server instance and a maximum of 25 users is ________. a. Windows Server 2012 R2 Datacenter b. Windows Server 2012 R2 Standard c. Windows Server 2012 R2 Essentials d. Windows Server 2012 R2 Foundation

c. Enable access-based enumeration

The company's Board of Directors would like you to create private folders, which users should not know exist. While you are creating the new network share for their folders, which New Share option should you choose to prevent users from seeing the folders? a. Encrypt data access b. Allow caching of share c. Enable access-based enumeration d. Enable BranchCache on the file share

c. A migration copies vital information from the existing Server to a clean installation of Windows Server 2012 R2.

The difference between in-place upgrade and a migration is ________. a. A migration is much simpler than an in-place upgrade. b. In-place upgrades take significantly less time. c. A migration copies vital information from the existing Server to a clean installation of Windows Server 2012 R2. d. There are no Windows Server tools available for a migration.

d. hierarchical; periods

The domain name part of a DNS name is _______ and consists of two or more words, separated by ______. a. peer-based; periods b. hierarchical; commas c. unranked; commas d. hierarchical; periods

a. configure the needed policy in a GPO. Then link the GPO to either the users or the computers.

The easiest way to deploy several printers to several clients is to ______. a. configure the needed policy in a GPO. Then link the GPO to either the users or the computers. b. assign the necessary rights and delegate the task to all users c. physically visit each computer and add the printers d. delegate the task to junior administrators nearest the computers to add the printers

b. Print device

The hardware that actually produces your hard-copy documents is called a _______. a. Printer b. Print device c. Print server d. Print driver

c. trusted forests

The most widespread source for membership of a universal group is: a. different organizational units b. different domains c. trusted forests d. only from within the domain

c. starter

The three types of Group Policy Objects (GPOs) include local, domain and _____. a. OU b. universal c. starter d. nonlocal

a. recursive query

The typical query one DNS server sends to a root name server is called a(n): a. recursive query b. iterative query c. referral d. forwarded query

a. 1, 2, 3

There are many different printing configurations available with the default Windows Server 2012 R2 installation. However, additional features are available after installing the Print and Document Services role. Which of these would be available only after installing the Print and Document Services role? (Select all that apply) 1. Internet Printing 2. Distributed Scan Services 3. Print Server 4. Basic Printing a. 1, 2, 3 b. 1, 2, 4 c. 1, 3, 4 d. 2, 3, 4

c. 1, 2, 5

There are several things to consider prior to upgrading to Windows Server 2012 R2. Select all that apply. 1. Check disk space 2. Check application compatibility 3. Check administrators possess Windows Server 2012 R2 related privileges 4. Check datacenter for sufficient rackspace 5. Check server meets minimum hardware requirements a. 1, 2, 3 b. 1, 2, 4 c. 1, 2, 5 d. 2, 3, 4 e. 2, 3, 5

c. 3

To configure a printer pool, you enabled printer pooling on the Ports tab under Printer Properties. You have five print devices ready for the printer pool. Of those five, four are in one room. Of the four, three use the same print driver. Of those three, two print devices are identical. How many print devices are in your printer pool? a. 5 b. 4 c. 3 d. 2

d. Backup Operators or Administrators

To extend or shrink a volume, of which built-in groups must you be a member? a. Administrators or Domain Admins b. Domain Admins or Server Operators c. Server Operators or Backup Operators d. Backup Operators or Administrators

a. security groups

To simplify the administration process, you should always assign permissions to ____ rather than to individuals. a. security groups b. distribution groups c. managers d. HR

c. Mapping drives

Users generally do not understand the concept of network drive sharing. They only know they can store their files "on my F: drive" and are unaware that someone else's F: drive might point to a different folder. What do we call this concept of having a drive letter associated to a user's network folder? a. Assigning drives b. Linking drives c. Mapping drives d. Clicking drives

c. Disabled with payload removed

Using Features on Demand results in saving potentially significant amounts of disk space. Features on Demand becomes a third installation state per feature in Windows Server 2012 R2. While previous versions allowed only Enable or Disable, Features on Demand provides _______. a. Disabled with payload removed b. Enabled by proxy c. Disabled and deleted d. Enabled by remote

d. Statistics are specific to each VM, even if you transfer between host systems

Using Resource Metering, you are documenting the network traffic and memory usage of all virtual machines on a physical server. What is Resource Metering's statistics associated with? a. Statistics show the user logins specific to the host operating system b. Statistics are specific to groups of VMs of a particular operating system c. Statistics show the total memory and traffic of the network adapter d. Statistics are specific to each VM, even if you transfer between host systems

a. 2

Using the Standard edition of Windows Server 2012 R2, you need to create 5 virtual machines. On how many can you install Windows Server 2012 R2 Standard edition? a. 2 b. 3 c. 4 d. 5

a. Single network adapter means a single point of failure.

Virtualization makes it possible to separate vital network functions on different systems without purchasing additional network adapters for each one. What is the drawback? a. Single network adapter means a single point of failure. b. Different systems mean much more system management. c. Separate network functions require more complex network management. d. There are no drawbacks, which is the ideal scenario.

b. If the drive is a network share, then Share permissions can be used.

What are an administrator's choices for managing file permissions on a drive formatted as FAT32? a. There is no way to protect the files with a driving formatted using the FAT file system. b. If the drive is a network share, then Share permissions can be used. c. If the drive is a local share, then Share permissions can be used. d. The drive can still be protected with NTFS permissions if local to the user.

a. Remote Desktop Connection program or the RD Web Access site

What are the 2 ways for remote clients to connect to a server in order to benefit from the Remote Desktop Easy Print driver? a. Remote Desktop Connection program or the RD Web Access site b. Server Manager the or the Remote Desktop Connection program c. Telnet or VPN d. Local LAN connection or the RD Web Access site

a. PowerShell cmdlets to enable administrators migrate roles between servers

What are the Windows Server Migration Tools? a. PowerShell cmdlets to enable administrators migrate roles between servers b. Server Manager automation tools for server role migration c. Fault tolerance tools that failover a server role in case of a server fail d. Tools to migrate server roles in case of disaster recovery

c. 2, 4

What are the advantages of using a distributed DHCP infrastructure? 1. Large convergence of network traffic 2. All the client/server network traffic is local, so minimal DHCP traffic on routers 3. Reduced administrative burden with fewer DHCP servers 4. Clients have ready access to DHCP servers a. 1, 2 b. 2, 3 c. 2, 4 d. 3, 4

c. They are essentially the same physically. Logically, the print jobs are handled differently.

What are the differences, physically and logically, between the two printing configurations: Network-attached Printing and Network-attached Printer Sharing? a. They are essentially the same, both logically and physically. b. They are essentially the same logically. Physically, the printers are made available differently. c. They are essentially the same physically. Logically, the print jobs are handled differently. d. These two printing configurations are not alike physically, nor logically.

a. IP Address, Subnet Mask, Default Gateway, and Preferred DNS Server

What are the four parameters to set when arriving at the Use The Following IP Address section of the Internet Protocol Version 4 (TCP/IPv4) Properties sheet? a. IP Address, Subnet Mask, Default Gateway, and Preferred DNS Server b. IP Address, Subnet Mask, Default Gateway, and Preferred DHCP Server c. IP Address, Default Gateway, Default Router, and Preferred DNS Server d. IP Address, Firewall Enable/Disabled, Default Gateway, and Preferred DNS Server

c. Root servers

What are the servers at the top of the DNS hierarchy called? a. Down-level servers b. Authoritative sources c. Root servers d. Forwarders

c. Application, Security, and System

What are the three primary event logs? a. Application, Forwarded, and System b. Application, Security, and Setup c. Application, Security, and System d. Application, System, and Setup

a. Container and leaf objects

What are the two basic classes of Active Directory objects? a. Container and leaf objects b. Domain and user objects c. Security and distribution d. Active and passive

d. administrator and guest

What are the two built-in user accounts are created on a computer running Windows Server 2012 R2? a. system and guest b. default and guest c. domain administrator and local administrator d. administrator and guest

b. 1, 4

What are the two categories of security settings within Group Policy? Select a one letter answer representing two choices from below. 1. User 2. Workstation 3. Administrator 4. Computer a. 1, 2 b. 1, 4 c. 2, 3 d. 2, 4

b. User Accounts in the control panel and the Local Users and Groups snap-in for MMC

What are the two interfaces for creating and managing local user accounts on a computer joined to the domain? a. Control Panel and ADAC b. User Accounts in the control panel and the Local Users and Groups snap-in for MMC c. ADAC and the Active Directory of Users and Computers snap-in for MMC d. Server Manager and PowerShell

a. local and domain

What are the two types of user accounts in Windows Server 2012 R2? a. local and domain b. domain and group c. authenticated and unauthorized d. shared and unique

c. Manage documents

What basic printer permission do you grant a user to be able to pause, resume, restart and cancel their own print jobs, as well as the print jobs of others? a. Print b. Manage this printer c. Manage documents d. Manage print jobs

d. With striped volumes, the system writes data one strip at a time per disk in the volume.

What is the difference between striped and spanned volumes? a. With striped volumes, you can lose one disk without losing the whole volume. b. With spanned volumes, the system spans the data across all disks in the volume one block at a time. c. With spanned volumes, you gain performance boost. d. With striped volumes, the system writes data one strip at a time per disk in the volume.

b. DHCPDISCOVER

What is the first packet sent to a DHCP server when a computer boots up? a. DHCPINFORM b. DHCPDISCOVER c. DHCPOFFER d. DHCPACK

b. An index of all AD DS objects in a forest

What is the global catalog? a. The schema that lists what objects and attributes exist in the AD DS forest b. An index of all AD DS objects in a forest c. A list of all domain controllers currently available d. A matrix of all domains, sites, and domain controllers

c. Global

What is the group scope for Domain Admins, Domain Controllers, and Domain Users default groups? a. Distribution b. Universal c. Global d. Domain local

c. At the second-level domain level

What is the highest level of the DNS hierarchy that contains hosts in addition to name servers? a. At the root servers level b. At the top-level domain level c. At the second-level domain level d. At the third-level domain level

a. In larger networks, delegation restricts access by using restricted permissions.

What is the key benefit behind delegating server administration? a. In larger networks, delegation restricts access by using restricted permissions. b. In smaller networks, delegation provides formalized synergy. c. In larger networks, delegation improves prioritization of tasks. d. In smaller networks, delegation eases coworker rivalry.

d. Download Hyper-V Server for free from the Microsoft website

What is the least expensive way an administrator can experiment with Hyper-V and virtualization? a. Purchase the Standard edition of Windows Server 2012 R2, which includes the Hyper-V role. b. Purchase the Essentials edition of Windows Server 2012 R2, which includes the Hyper-V role. c. Purchase the Datacenter edition of Windows Server 2012 R2, which includes the Hyper-V role. d. Download Hyper-V Server for free from the Microsoft website

c. 64

What is the maximum number of shadow copies supported by Windows Server 2012 R2? a. Unlimited b. 8 c. 64 d. 48

d. Using the Remove Roles and Features Wizard

What is the method for removing a domain controller in Windows Server 2012 R2? a. Using the Dcpromo.exe command b. Using the Add Roles and Features Wizard c. Using the Adprep.exe command d. Using the Remove Roles and Features Wizard

b. 3

What is the minimum number of physical disks required to create a RAID 5 volume? a. 2 b. 3 c. 5 d. 1

d. 80

What is the most usual incoming port number for a web server? a. 53 b. 25 c. 118 d. 80

d. ReFS

What is the new file system available in Windows Server 2012 R2? a. NTFS b. FAT32 c. exFAT d. ReFS

b. Domain Controllers OU

What is the only OU created by default after installing Active Directory? a. Users OU b. Domain Controllers OU c. Global OU d. Computers OU

d. LSDOU (local, site, domain, then OU)

What is the order in which Windows systems receiving and process multiple GPOs. a. LSOUD (local, site, OU, then domain) b. LOUDS (local, OU, domain, then site) c. SLOUD (site, local, OU, then domain) d. LSDOU (local, site, domain, then OU)

b. Server Manager

What is the preferred graphical tool in Windows Server 2012 R2 with which you can manage storage pools and create virtual disks? a. Disk Management for MMC b. Server Manager c. DiskPart.exe d. the VHD wizard

a. number of possible hosts and networks

What is the primary benefit of the IPv6 address space over the IPv4 address space? a. number of possible hosts and networks b. motive to update and upgrade hardware and software c. complexity d. length

b. Hyper-V Manager

What is the primary graphical tool for creating and managing virtual machines? a. Server Manager b. Hyper-V Manager c. Add Roles and Features wizard d. PowerShell

d. File and Storage Services in Server Manager

What is the primary tool in Windows Server 2012 R2 to take control of the shares on all your disks on all your servers and exercise granular control over their properties? a. Disk Management MMC snap-in b. Add Users and Computers c. Disk Management in Control Panel d. File and Storage Services in Server Manager

b. Authorization

What is the process of granting the user access only to the resources he or she is permitted to use? a. Authentication b. Authorization c. Importing a user object to Active Directory d. Registering the SRV record

a. Linking

What is the proper term for associating a Group Policy to a set of AD DS objects? a. Linking b. Connecting c. Implementing d. Granting

b. Administrators can log successful and failed security events, such as account access and object access.

What is the purpose of the Audit Policy section of a local GPO? a. Administrators can log successful and failed security events, such as logon events, database errors, and system shutdown. b. Administrators can log successful and failed security events, such as account access and object access. c. Administrators can log successful and failed events, forwarded from other systems. d. Administrators can log events related specifically to domain controllers.

a. JBOD

What is the simplest and least expensive of external drive arrays? a. JBOD b. NAS c. SAN d. RAID 5

a. Importing the security template into a GPO

What is the simplest way to deploy a security template on several computers simultaneously? a. Importing the security template into a GPO b. Delegating the template to the on-site administrators c. Linking the template to the applicable domain controller d. Saving a copy of the template to each computer

d. Several Microsoft and non-Microsoft OSs such as CentOS 6.0-6.2, Red Hat Enterprise Linux 6.0-6.2, SuSE Linux Enterprise Server 11 SP2

What types of operating systems are allowable as virtual machine? a. Windows Server 2012 R2, for as many instances allowed by licensing b. Windows Server 2012 R2 and recent down-level servers such as Windows Server 2008 and Windows Server 2008 R2 c. Windows operating systems in general d. Several Microsoft and non-Microsoft OSs such as CentOS 6.0-6.2, Red Hat Enterprise Linux 6.0-6.2, SuSE Linux Enterprise Server 11 SP2

c. Active Directory Administrative Center (ADAC)

What user creation tool incorporates new features such as the Active Directory Recycle Bin and fine-grained password policies? a. Active Directory Users and Computers console b. Windows PowerShell c. Active Directory Administrative Center (ADAC) d. LDIFDE.exe

b. Windows Server 2008 R2 and Windows Vista

What versions of Windows began support of multiple local GPOs? a. Windows Server 2008 R2 and Windows 8 b. Windows Server 2008 R2 and Windows Vista c. Windows Server 2008 and Windows 7 d. Windows Server 2003 and Windows XP

c. Terminal Services

What was the former name of Remote Desktop Services? a. Remote Desktop b. Remote Services c. Terminal Services d. Terminal Desktop

b. Master Boot Record (MBR) only

What was the partition style(s) prior to Windows Server 2008 and Windows Vista? a. Master Boot Record (MBR) and GUID Partition Table (GPT) b. Master Boot Record (MBR) only c. GUID Partition Table (GPT) only d. Neither of the two listed above

b. cn=Ella Parker,ou=Marketing,dc=adatum,dc=com

What would be the distinguished name (DN) for a user named Ella Parker, whose user account resides in the Marketing OU of the adatum.com domain? a. cn=Ella Parker,dc=adatum,dc=com b. cn=Ella Parker,ou=Marketing,dc=adatum,dc=com c. dn=Ella Parker,dc=adatum,dc=com d. dn=Ella Parker,ou=Marketing,dc=adatum,dc=com

c. UDP; 53

When a DNS server communicates a name resolution query to another DNS server, what type of datagram is used, and over what port? a. UDP; 35 b. TCP; 35 c. UDP; 53 d. TCP; 53

b. Remote Desktop Easy Print

When a Remote Desktop Services client connects to a server, it runs applications using the server. However, if that client wants to print a document from one of those applications, the client wants to use the print device connected to the local client computer. What component allows a remote desktop services client to print locally? a. Remote Desktop Printing b. Remote Desktop Easy Print c. Local Access Printing d. Easy Desktop Print

d. Windows PowerShell Desired State Configuration Service

When creating a centralized DSC server, which of the following is installed on a server running Windows Server 2012 R2? a. PowerShell 3.0 and .NET Framework 4.5 b. Active Directory Domain Services c. Domain Naming Services d. Windows PowerShell Desired State Configuration Service

a. As the user logs in

When does Windows apply Computer Configuration policies by default? a. As the user logs in b. When the computer shuts down c. As the user logs out d. When the computer starts up

a. As the user logs in

When does Windows apply User Configuration policies by default? a. As the user logs in b. When the computer shuts down c. As the user logs out d. When the computer starts up

c. With the Manage This Printer permission, configure Printer Properties of a printer and set priority to a higher number than others, up to 99

When managing printers, what is a method of giving certain users in your organization priority access to a print device? How to assure their print jobs are handled above others? a. Purchase extra print devices for those certain users b. Tell the certain users to send their print jobs to a lesser-used printer c. With the Manage This Printer permission, configure Printer Properties of a printer and set priority to a higher number than others, up to 99 d. With the Manage This Printer permission, configure Printer Properties of a printer and set priority to a lower number than others, down to 1

a. the first

When multiple GPOs are linked to a container, which GPO in the list has the highest priority? a. the first b. the last c. the most permissive d. the most restrictive

b. partitions

When the Hyper-V role is added to a Windows Server 2012 R2 server, the hypervisor creates the individual environments, each of which has its own operating system installed and accesses the computer's hardware via the hypervisor. What are those individual environments called? a. servers b. partitions c. processors d. machines

d. Less traffic crossing the network perimeter

When using DNS for name resolution only, why should a company consider using DNS servers outside the network perimeter? a. Less administration b. Less internal traffic c. Fewer servers in the communications server rack d. Less traffic crossing the network perimeter

c. nodes

When using Windows PowerShell 4.0, which of the following does Desired State Configuration (DCS) use to represent computers and resources that you want to define? a. objects b. keys c. nodes d. lines

b. Enterprise Admins

Which of the following default groups is a universal group? a. Certificate Publishers b. Enterprise Admins c. Domain Users d. Domain Admins

a. When an administrator wants to save time while creating many users with attributes in common

When would administrators choose to use a User Template? a. When an administrator wants to save time while creating many users with attributes in common b. When an administrator wants to save task steps while delegating user creation to other users c. When an administrator wants to ensure quality assurance in creating new objects d. When an administrator is accustomed to using User Templates

d. access control entries; access control list

When you manage permissions in any of the Windows Server 2012 R2 permission systems, you are actually creating and modifying the _______ in an _______. a. security principal; access control list b. access control lists; access control group c. security principal; access control group d. access control entries; access control list

c. %systemroot%\SYSVOL\sysvol\<domain name>\Policies

Where is the path to the default GPT structure for a domain? a. %systemroot%\SYSVOL\sysvol\<domain name>\Policies\. b. %systemroot%\SYSVOL\sysvol\<domain name>\Policies\{GUID} c. %systemroot%\SYSVOL\sysvol\<domain name>\Policies d. %systemroot%\SYSVOL\sysvol\<domain name>

b. Teredo

Which IPv4-to-IPv6 transition technology works through NAT IPv4 routers by establishing tunnel endpoints behind non-IPv6 routers that encapsulate IPv6 packets with UDP datagrams? a. ISATAP b. Teredo c. 6to4 d. NAT Converter

d. Graphics adapter virtualization

Which of the following RemoteFX features enables client systems to offload some of the graphics processing tasks they would normally perform locally? a. FastGPU b. GPUAssist c. Enhanced sessions mode d. Graphics adapter virtualization

a. Add-DhcpServerv4Scope

Which of the following Windows PowerShell cmdlets creates an IPv4 DHCP scope? a. Add-DhcpServerv4Scope b. Add-DhcpServerScope c. Add-DhcpScope d. New-DhcpServerScope

d. Remote Access

Which of the following roles must be installed in order to deploy a DHCP Relay Agent on Windows Server 2012 R2? a. DHCP b. DNS c. AD DS d. Remote Access

a. Create a reservation in the DHCP scope.

Which of the following steps must be completed in order to do ensure a network printer is assigned the same address through the DHCP server? a. Create a reservation in the DHCP scope. b. Create an exclusion in the DHCP scope. c. Create a special scope on the DHCP server. d. Define the DHCP server on the client in the Advanced TCP/IP Advanced Settings.

b. File permissions

Which of these is NOT one of the Windows permission systems? a. Share permissions b. File permissions c. Registry permissions d. Active Directory permissions

a. Internet Corporation for Assigned Names and Numbers (ICANN)

Who is responsible for the ratification of new top-level domains? a. Internet Corporation for Assigned Names and Numbers (ICANN) b. Network Solutions, Inc. (NSI, formerly known as InterNIC) c. Internet Assigned Numbers Authority (IANA) d. Contoso.com

c. To separate and limit full administrator access in large networks

Why do administrators delegate server administration? a. To give access to sensitive information b. To save time for their own needs c. To separate and limit full administrator access in large networks d. To train junior administrators for their eventual progression to full administrator

c. To allow a DHCP server to request a DNS server to update or create a record.

Why is the DNS service included in Windows Server 2012 R2 integrated with DHCP service? a. To allow a DNS server to inform DHCP clients with updated information. b. To update both DNS and DHCP clients with information from the Active Directory. c. To allow a DHCP server to request a DNS server to update or create a record. d. DNS and DHCP services are not integrated in Windows Server 2012 R2.

a. .wfw

Windows Firewall allows an administrator to import and export firewall rules. What are the rules' file extension? a. .wfw b. .inf c. .wfr d. .inr

d. Domain, private, and public

Windows Firewall uses three profiles to represent the type of network to which the server is connected. What are the three profiles? a. Private, temporary, and authenticated b. Public, DMZ, and private c. Internet, secure, and private d. Domain, private, and public

c. Storage Spaces

Windows Server 2012 R2 includes a new disk virtualization technology called ______, which enables a server to concatenate storage space from individual physical disks. a. Storage Disks b. Storage Pool c. Storage Spaces d. Storage Volumes

b. Minimal Server Interface

Windows Server 2012 R2 offers a compromise between Server Core and more traditional server administration tools called: a. Minimal Graphic Interface b. Minimal Server Interface c. Enhanced Server Core d. Storage Spaces e. PowerShell

d. Network File System and Server Message Blocks

Windows Server 2012 R2 supports two types of folder shares. What are those two types? a. Redirected and Network File System b. Server Message Blocks and Redirected c. Server Message Blocks and Network folders d. Network File System and Server Message Blocks

d. The system copies, and then deletes the oldest copy.

With the Volume Shadow Copy Service enabled, what does the system do if the maximum number of copies supported by Windows Server 2012 R2 is reached? a. The system no longer makes copies. b. The system does not impose a limit on the number of copies made. c. The system copies, and then immediately deletes that copy. d. The system copies, and then deletes the oldest copy.

c. organizational unit

Within a domain, the primary hierarchical building block is the _________. a. forest b. group c. organizational unit d. user

d. ports, protocols, applications, users, and IP address ranges

You can configure the Windows Firewall to allow or block specific _________. a. ports and protocols b. applications and users c. ports, protocols, and applications, but not users d. ports, protocols, applications, users, and IP address ranges

c. You can disable the setting area that is not configured for faster processing.

You create a GPO that contains computer settings, but not user settings. What can you do to quicken GPO processing? a. You can set the priority higher for the configured setting area. b. You can manually refresh the GPO settings. c. You can disable the setting area that is not configured for faster processing. d. Regardless of whether part or all of a GPO is configured, the GPO is processed at the same speed.

b. Use Server Manager to start the Remove Roles and Features Wizard.

You decide to change the interface on your Windows Server 2012 R2 server. Select the best answer to convert a GUI server to Server Core. a. Reinstall the operating system and select Server Core upon installation. b. Use Server Manager to start the Remove Roles and Features Wizard. c. Use Server Manager to deselect the Server Graphical Shell option. d. Once you use GUI, you cannot switch to Server Core.

a. Yes, when you move the file, its permissions go with it.

You grant a user the NTFS permissions needed to access a file. You then move the file to a different location. Is the user still able to access the file? a. Yes, when you move the file, its permissions go with it. b. Yes, when you move the file, the ACE in the user's account is updated. c. No, you must update the user's account. d. No, you must update the file's permissions.

d. Connect multiple printers to a single print device

You have an executive who needs her print jobs handled above those of others. How would you accomplish this advanced printing configuration? a. Connect multiple users to a single print server b. Connect a single printer to multiple print devices c. Connect multiple print devices to a single print server d. Connect multiple printers to a single print device

a. File Server role service

You know that installing Windows Server 2012 R2 includes Storage Services by default. Why can't you then create and manage SMB shares using Server Manager? What must be installed first? a. File Server role service b. File and Storage Services role c. Advanced Storage Services role service d. Server for NFS role service

c. Install the role to the VHD while still offline.

You need to add a role to a VM in an offline state. How do you proceed? a. Start the VM, mounting the virtual hard disk (VHD). Then add the role. b. Create a new VHD with the added role. Replace the old VHD with the new VHD. c. Install the role to the VHD while still offline. d. Add the role to a different VM.

a. subdomains of contoso.com

You registered the domain name contoso.com. The FQDNs seattle.contoso.com and halifax.contoso.com are examples of different _____. a. subdomains of contoso.com b. second-level domains c. top-level domains d. IP addresses

b. Use Server Manager on any Windows Server 2012 R2 to connect and install the role to all the systems.

You want to add a role to several Windows Server 2012 R2 systems on the network. Which of the following is correct? a. Install a role at the target server's console. b. Use Server Manager on any Windows Server 2012 R2 to connect and install the role to all the systems. c. Connect to the target server using Remote Desktop Services. d. Using PowerShell, install the role to all target servers at once using the Install-NewFeature -ConfigurationFilePath <ExportedConfig.xml> cmdlet.

d. EnclosureAwareDefault

You want to create a new storage pool from a disk enclosure using the Windows PowerShell New-StoragePool cmdlet. What parameter would you need to use with the cmdlet to specify that the disks are housed in a disk enclosure? a. Add-Enclosure b. Destination:Enclosure c. target:Enclosure d. EnclosureAwareDefault

b. Connect a single printer to multiple print devices

Your environment includes many users who print documents often. A single print device isn't sufficient. You need a "printer pool" to accommodate all the concurrent print jobs. How would you accomplish this advanced printing configuration? a. Connect multiple users to a single print server b. Connect a single printer to multiple print devices c. Connect multiple print devices to a single print server d. Connect multiple print servers to a single print device

d. Roles; web server

______ define the primary functions of a server. A server with the Web Server (IIS) role installed is colloquially referred to as a(n) ________, no matter what other functions it might perform. Select the word pair that fills the blanks. a. Applications; application server b. Users; web server c. Drives; file server d. Roles; web server


Related study sets

Organizational Behavior- Chapter 3

View Set

Chapter 16.3 Biomedical Therapies and Preventing Psychological Disorders

View Set

Cyber Security and Control Systems (CSCS) Phase 1 (19-42)- Day 2

View Set

Math: Lesson 11 Measurement Abeka

View Set

Chapter 3 Study guide The manager as a leader

View Set